<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vmware-carbon-black and App-ID in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vmware-carbon-black-and-app-id/m-p/567881#M114676</link>
    <description>&lt;P&gt;Some vendors use cert-pinning to detect decryption between connections, EDR/XDR are starting to do this more. You will need to write an exclusion for the domains, if that is what they are doing as that could likely be breaking this. If you look at the exclusion list in your firewall you'll see a whole number of cert-pinning services (okta, etc)&lt;/P&gt;</description>
    <pubDate>Fri, 01 Dec 2023 02:39:33 GMT</pubDate>
    <dc:creator>LAYER_8</dc:creator>
    <dc:date>2023-12-01T02:39:33Z</dc:date>
    <item>
      <title>vmware-carbon-black and App-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vmware-carbon-black-and-app-id/m-p/457409#M101845</link>
      <description>&lt;P&gt;I've run into an issue with regard to deploying VMWare Carbon Black within my environment.&amp;nbsp; There are a subset of endpoints that have never connected to the Internet directly and use proxy allowances for Windows Updates, etc. I have requested that the ports and URLs that VMWare Carbon Black uses have allowances so that can register successfully from my environment. For the most part, a majority of the endpoints are able to install the sensor(s) without any issues, however I am getting cert errors for the sensors that fail to register. I've verified that certs in question (GoDaddy) are present in both of the cert stores on the proxy (Palo Alto) and the endpoints&amp;nbsp; After digging a bit, I think the issue for this subset of endpoints failing to install the sensors is due to the policy group that is being applied.&amp;nbsp; I don't see any settings/configuration s for the App-ID specifically for&amp;nbsp;vmware-carbon-black which seems to be tagged as web-browsing and ssl.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone come across this scenario before in which the method of applying trusts, etc. using ports and urls still fail?&amp;nbsp; If so, were those issues able to be resolved by using App-ID instead?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jan 2022 01:28:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vmware-carbon-black-and-app-id/m-p/457409#M101845</guid>
      <dc:creator>ewashing3</dc:creator>
      <dc:date>2022-01-07T01:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: vmware-carbon-black and App-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vmware-carbon-black-and-app-id/m-p/567881#M114676</link>
      <description>&lt;P&gt;Some vendors use cert-pinning to detect decryption between connections, EDR/XDR are starting to do this more. You will need to write an exclusion for the domains, if that is what they are doing as that could likely be breaking this. If you look at the exclusion list in your firewall you'll see a whole number of cert-pinning services (okta, etc)&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 02:39:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vmware-carbon-black-and-app-id/m-p/567881#M114676</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2023-12-01T02:39:33Z</dc:date>
    </item>
  </channel>
</rss>

